ONTRIVE
📚
Browse Categories
💻
Code Playground
📝
Blog
Home
Explore
Code
Search
🏠 Home
📚 Courses
The Complete Cyber Security Course Hackers Exposed!
The Complete Cyber Security Course Hackers Exposed!
Categories:
Cyber Security
$49.99
$9.99
Save 80%
What's included
Certificate of completion
Add to Cart
Buy Now
Create an account to start learning
📚
Course Content
📝
Description
🎯
What To Learn
📦
Materials Included
✅
Requirements
👥
Target Audience
Introduction
7 items
7 lessons
Welcome and Introduction to the Instructor!
2:06
Security Quick Win!
11:59
Goals and Learning Objectives - Volume 1
2:30
Target Audience
1:54
Study Recommendations
5:16
Course updates
00:40
Cyber Security and Ethical Hacking Careers
3:45
know Yourself - The Threat and Vulnerability Landscape
11 items
11 lessons
Theory and Practical
1:08
Goals and Learning Objectives
00:41
Protect What You Value
4:37
What is Privacy, Anonymity and Pseudonymity
4:35
Security, Vulnerabilities, Threats and Adversaries
4:37
Asset Selection
3:21
Threat Modeling and Risk Assessments
7:51
Security vs Privacy vs Anonymity - Can we have it all
1:56
Confidentiality, Integrity and Availability - (Security Attributes)
9:22
Defense In Depth
1:36
The Zero Trust Model
3:40
Know Your Enemy - The Current Threat and Vulnerability Landscape
18 items
18 lessons
Goals and Learning Objectives
00:43
Why You Need Security – The Value Of A Hack
5:14
The Top 3 Things You Need To Stay Safe Online
1:23
Security Bugs and Vulnerabilities - The Vulnerability Landscape
9:35
Hackers, crackers and cyber criminals
2:32
Malware, viruses, rootkits and RATs
6:52
Spyware, Adware, Scareware, PUPs & Browser hijacking
4:44
What is Phishing, Vishing and SMShing
15:06
Spamming & Doxing
3:15
Social engineering - Scams, cons, tricks and fraud
5:31
CPU Hijackers - Crypto Mining Malware and Cryptojackers
8:42
Darknets, Dark Markets and Exploit kits
8:01
Governments, spies and secret stuff part I
5:13
Governments, spies and secret stuff part II
10:35
Regulating encryption, mandating insecurity & legalizing spying
14:37
Trust & Backdoors
10:14
Censorship
2:24
Cyber Threat Intelligence – Stay Informed
1:12
Encryption Crash Course
13 items
13 lessons
Goals and Learning Objectives
00:24
Symmetric Encryption
9:54
Asymmetric Encryption
10:17
Hash Functions
6:32
Digital Signatures
4:45
Secure Sockets Layer (SSL) and Transport layer security (TLS)
13:26
SSL Stripping
12:02
HTTPS (HTTP Secure)
7:00
Digital Certificates
6:21
Certificate Authorities and HTTPS
14:07
End-to-End Encryption (E2EE)
1:57
Steganography
8:12
How Security and Encryption is Really Attacked
2:42
Setting up a Testing Environment Using Virtual Machines (Lab)
5 items
5 lessons
Goals and Learning Objectives
00:28
Introduction to Setting up a Testing Environment Using Virtual Machines
10:01
Vmware
10:55
Virtual box
12:10
Kali Linux 2018
4:11
Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
20 items
20 lessons
Goals and Learning Objectives
00:37
Security Features and Functionality
5:56
Security Bugs and Vulnerabilities
5:31
Usage Share
5:01
windows 10 - Privacy & Tracking
6:08
Windows 10 - Disable tracking automatically
4:42
Windows 10 - Tool Disable Windows 10 Tracking
8:14
Windows 10 – Cortana
3:00
Windows 10 – Privacy Settings
9:40
Windows 10 - WiFi Sense
4:16
Windows 7, 8 and 8.1 - Privacy & Tracking
7:19
Mac - Privacy & Tracking
4:28
Linux and Unix “like” Operating systems
3:30
General Use Operating Systems (Windows, MacOS and Linux)
4:09
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
5:04
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
2:55
Anonymity Focused Operating Systems (Tails and Whonix OS)
2:56
Penetration Testing and Ethical Hacking Focused Operating Systems
00:49
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
2:31
Linux - Debian 8 Jessie - Virtual box guest additions Issue
6:26
Security Bugs and Vulnerabilities
13 items
13 lessons
Goals and Learning Objectives
00:25
The Importance of Patching
3:47
Windows 7 - Auto Update
1:15
Windows 10 - Auto Update
1:25
Windows 10 - Auto Update
1:25
Windows - Criticality and Patch Tuesday
3:46
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
8:34
Linux - Debian - Patching
10:58
Mac - Patching
6:58
Firefox - Browser and extension updates
4:23
Chrome - Browser and extension updates
1:13
IE and Edge - Browser and extention updates
00:46
Auto updates - The Impact to privacy and anonymity
1:41
Reducing Threat Privilege
4 items
4 lessons
Goals and Learning Objectives - Removing Privilege
2:53
Windows 7 - Not using admin
3:32
Windows 8 and 8.1 - Not using admin
4:15
Windows 10 - Not using admin
3:25
Social Engineering and Social Media Offence and Defence
6 items
6 lessons
Goals and Learning Objectives
00:26
Information Disclosure and Identity Strategies for Social Media
12:34
Identify Verification and Registration
5:05
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
7:51
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
10:22
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
5:02
Security Domains
2 items
2 lessons
Goals and Learning Objectives
00:21
Security Domains
10:00
Security Through Isolation and Compartmentalization
18 items
18 lessons
Goals and Learning Objectives
00:37
Introduction to Isolation and Compartmentalization
2:10
Physical and Hardware Isolation - How to change the Mac Address
7:10
Physical and Hardware Isolation - Hardware Serials
11:18
Virtual Isolation
8:36
Dual Boot
2:41
Built-in Sandboxes and Application Isolation
3:07
Windows - Sandboxes and Application Isolation
5:57
Windows - Sandboxes and Application Isolation - Sandboxie
11:29
Linux - Sandboxes and Application Isolation
3:04
Mac - Sandboxes and Application Isolation
6:34
Virtual Machines
10:51
Virtual Machine Weaknesses
10:31
Virtual Machine Hardening
9:15
Whonix OS - Anonymous Operating system
20:51
Whonix OS - Weaknesses
4:18
Qubes OS
19:07
Security Domains, Isolation and Compartmentalization
4:42
Wrap Up
6 items
6 lessons
Congratulations
00:58
Certificate Of Completion for CPEs
00:56
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
16:23
Sample from Vol 2 - Password cracking part 2
7:09
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
15:21
Sample from Vol 4 - Email clients, protocols and authentication
13:17
BONUS Section
1 item
1 lesson
BONUS
$49.99
$9.99
Save 80%
What's included
Certificate of completion
Add to Cart
Buy Now
Create an account to start learning